CVE-2023-5800
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
05/02/2024
Last modified:
08/11/2024
Description
Vintage,<br />
member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi<br />
did not have a sufficient input validation allowing for a possible remote code<br />
execution. This flaw can only be exploited after authenticating with an<br />
operator- or administrator-privileged service account. Axis has released patched AXIS OS<br />
versions for the highlighted flaw. Please refer to the Axis security advisory<br />
for more information and solution.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* | 11.8.61 (excluding) | |
| cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:* | 9.80.55 (excluding) | |
| cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:* | 10.12.220 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



